system file
Recently Published Documents


TOTAL DOCUMENTS

31
(FIVE YEARS 11)

H-INDEX

3
(FIVE YEARS 0)

2022 ◽  
Author(s):  
Asghar Dabiri ◽  
Nader Jafarnia Dabanloo ◽  
Fereidoun Nooshiravan ◽  
Keivan Maghooli

Abstract This paper presents design and simulation of an Interval type-2 fuzzy system (IT2FS) based, Adaptive neuro-fuzzy inference system(ANFIS) pacemaker controller in MATLAB. After designing the type-1 fuzzy logic model, the stability of the designed system has been verified in the time-domain (unit step response). In previous works, type-1 (IT1FS) model step response was analyzed and compared with the other PID and Fuzzy models that only least-square-estimation and the backpropagation algorithms are used for tuning membership functions and generation of type-1 fis (fuzzy inference system) file, but at current work Fuzzy C Means (FCM) method that shows better results has been used. The pacemaker controller determines the pacing rate and adjusts the heart rate of the patient with respect to the reference input signal. The rise-time, overshoot and settling-time have been improved significantly.


2021 ◽  
Author(s):  
asghar dabiri ◽  
Nader Jafarnia Dabanloo ◽  
Fereidoon Nooshirvan Rahatabad ◽  
Keivan Maghooli

Abstract This paper presents estimation of missed samples recovery of Synthetic electrocardiography (ECG) signals by an ANFIS (Adaptive neuro-fuzzy inference system) method. After designing the ANFIS model using FCM (Fuzzy C Means) clustering method. In MATLAB’s standard library for ANFIS, only least-square-estimation and the back-propagation algorithms are used for tuning membership functions and generation of fis (fuzzy inference system) file, but at current work we have used FCM method that shows better result. Root mean square error (difference of the reference input and the generated data by ANFIS) for the three synthetic data cases are: a. Train data: RMSE = 1.7112e-5b. Test data: RMSE = 5.184e-3c. All data: RMSE = 2.2663e-3


2021 ◽  
Vol 12 (1) ◽  
pp. 69-83
Author(s):  
Saygin Siddiq Ahmed ◽  
Ahmed R. J. Almusawi ◽  
Bülent Yilmaz ◽  
Nuran Dogru

Abstract. This study introduces a new control method for electromyography (EMG) in a prosthetic hand application with a practical design of the whole system. The hand is controlled by a motor (which regulates a significant part of the hand movement) and a microcontroller board, which is responsible for receiving and analyzing signals acquired by a Myoware muscle device. The Myoware device accepts muscle signals and sends them to the controller. The controller interprets the received signals based on the designed artificial neural network. In this design, the muscle signals are read and saved in a MATLAB system file. After neural network program processing by MATLAB, they are then applied online to the prosthetic hand. The obtained signal, i.e., electromyogram, is programmed to control the motion of the prosthetic hand with similar behavior to a real human hand. The designed system is tested on seven individuals at Gaziantep University. Due to the sufficient signal of the Mayo armband compared to Myoware sensors, Mayo armband muscle is applied in the proposed system. The discussed results have been shown to be satisfactory in the final proposed system. This system was a feasible, useful, and cost-effective solution for the handless or amputated individuals. They have used the system in their day-to-day activities that allowed them to move freely, easily, and comfortably.


2021 ◽  
Vol 12 (46) ◽  
pp. 111-116
Author(s):  
Letícia Tainá de Oliveira Lemes ◽  
Wellington Fernandes Falcão ◽  
Tais Kich ◽  
Tiago Lange dos Santos

The aim of this study was to report a series of clinical cases that show how the presence of the mesiovestibular 2 canal l(MV2) in the first maxillary molar is truly found. Patients complained of spontaneous pain with a history of element 26 or 16, some with deep caries and extensive restorations. Vertical and horizontal percussion tests, thermal tests. and radiographic analysis were performed. The canal was disinfected with abundant irrigation of 2.5% sodium hypochlorite. After, the root canals were located with files # 8 and #10, then the foraminal patency was performed with the EASY system file #25.01, root canal preparations were performed with EASY files from the Logic series #25.05, #40.05 and files #25.04, #30.03, #35.03. After using each file, irrigation with sodium hypochlorite was performed. After the canals were prepared, the cone test was carried out. After drying the canals, the final filling was performed with calibrated Tanari cones and AH plus cement. It was concluded that the occurrence of MV2 canal is high in the first maxillary molars and their location for disinfection is of paramount importance.


2020 ◽  
Vol 5 (3) ◽  
pp. 77
Author(s):  
Welda Welda ◽  
Desak Made Dwi Utami Putra ◽  
Ayu Manik Dirgayusari

Notary Office / PPAT I Gusti Rai Daniel Ari Putra, SH., M.Kn. is a Land Deed Making Official who makes deeds related to land. In carrying out this work, records are still carried out manually, namely still using a recording system in the book which consists of a file monitoring management process, payment for services, and does not provide information regarding the reporting of files that have been completed. This results in each service requiring time from the time the application is submitted to the completion of the file, besides that proof of payment for services can be lost if not recorded. Based on these problems, needed a system to facilitate the management of the file being executed and facilitate business processes that exist in this study created a system with the title Design of Information System File Management in the Office of Notary / PPAT which include data management of the applicant, the data in the file status request , payments and report. This research process uses a linear sequential model method, starting from determining needs, analyzing needs and designing CDM and PDM for the next steps. Furthermore, the authors build and design a system using the PHP programming language and MySQL as a database. The final result of this research is a file management information system at the Notary Office I Gusti Rai Daniel Ari Putra, SH., M.Kn. and testing has been carried out on the system using black box testing whose results are in accordance with the system design.


2020 ◽  
Vol 2 (1) ◽  
pp. 1-10
Author(s):  
Nuril Anwar ◽  
Son Ali Akbar ◽  
Ahmad Azhari ◽  
Imam Suryanto

Pesatnya perkembangan aplikasi android, terutama aplikasi di bidang e-commerce dan transaksi jual beli online yang populer di Indonesia, memaksa pengguna untuk memberikan izin untuk menggunakan fitur dan layanan aplikasi selama pemasangan dan pasca pemasangan. Kurangnya pemahaman pengguna akan resiko dari izin akses yang diminta oleh aplikasi sebelum atau setelah melakukan instalasi menjadikan celah pada keamanan data pengguna untuk mengakses fitur pada perangkat smartphone seperti kamera, media penyimpanan, kontak, akun dan fitur lainnya. Logical Extraction Method menjadi metode yang digunakan untuk mendapatkan data aplikasi dengan mengakusisi seluruh data file sistem pada smartphone menggunakan bantuan tools MOBILedit Forensic, TWRP (Team Win Recovery Project), dan Aplikasi Migrate. Akusisi data dari masing-masing aplikasi akan diambil Android Package File (APK) yang digunakan untuk proses analisis secara statis dengan menggunakan Tools Forensic MobSF (Mobile Security Framework). Berdasarkan hasil analisis yang dilakukan pada tiga aplikasi teratas e-commerce terdapat 51 izin akses dan dari tiga aplikasi e-commerce terpopuler di Indonesia dengan tingkat keamanan paling berbahaya dengan 49 izin akses, 7 izin akses normal dan 1 izin akses tanda tangan. Aplikasi lazada terdapat 21 izin akses berbahaya yang tidak diketahui pengguna sedangkan aplikasi Tokopedia terdapat 4 izin akses berbahaya yang tidak diketahui pengguna dan aplikasi Blibli.com terdapat 1 izin akses berbahaya yang tidak diketahui pengguna. Berdasarkan temuan celah keamanan dapat disimpulkan bahwa aplikasi e-commerce yang digunakan oleh penggunanya memungkinkan pula disisipi sebuah malware atau virus sejenis yang berpeluang dalam penggambilan data pribadi penggunanya.  The rapid development of android applications, especially applications in the field of e-commerce and online buying and selling transactions that are popular in Indonesia, force users to give permission to use the features and services of the application during installation and post-installation. Lack of user understanding of the risk of access permissions requested by the application before or after installation creates a gap in the user's data security to access features on smartphone devices such as cameras, storage media, contacts, accounts, and other features. Logical Extraction Method is a method used to obtain application data by acquiring all system file data on smartphones using the help of MOBILedit Forensic tools, TWRP (Team Win Recovery Project), and Migrate Applications. Data acquisition from each application will be taken by Android Package File (APK) which is used for the static analysis process using Tools Forensic MobSF (Mobile Security Framework). Based on the results of an analysis conducted on the top three e-commerce applications there are 51 access permits and of the three most popular e-commerce applications in Indonesia with the most dangerous level of security with 49 access permits, 7 normal access permits, and 1 signature access permit. The Lazada application has 21 dangerous access permits that the user does not know while the Tokopedia application has 4 dangerous access permits that the user does not know and the Blibli.com application has 1 dangerous access permit that the user does not know about. Based on the findings of a security hole, it can be concluded that the e-commerce application used by its users also allows the insertion of a malware or virus that has the opportunity to capture the user's personal data.


2019 ◽  
Vol 0 (9/2019) ◽  
pp. 19-25
Author(s):  
Andrzej Chojnacki ◽  
Fryderyk Darnowski

This paper aims at demonstrating a mathematical model of the process of writing and deleting information about files on a disk, using the contents of the $MFT system file, i.e. in a file generated in the NTFS (New Technology File System). The presented model uses the language of control theory, where the state of the system is equal to the state of the disk and the state of the $MFT file, and where control is understood as undertaking the action of writing or deleting. The deterministic nature of the process and its stationarity were assumed. Then, based on the transition function after its specification, we suggest constructing further inverse images of possible prior states at subsequent stages of data writing or deletion. The obtained results form the basis for the implementations developed.


Author(s):  
Rismayani

Lembaga Pengembangan dan Pemberdayaan Tenaga Pendidik Bidang Kelautan, Perikanan, Teknologi Informasi dan Komunikasi (LPPPTK KPTK) merupakan salah satu unit pelaksana teknis Kementerian Pendidikan dan Kebudayaan dibidang pengembangan dan pemberdayaan pendidik dan tenaga kerja pendidik dibidang kelautan, perikanan, teknologi informasi dan komunikasi yang terletak di kabupaten Gowa Provinsi Sulawesi Selatan. Adapun masalah pada penelitian ini adalah bagaimana agar file-file berupa soal untuk uji kompetensi guru dan surat tugas pegawai dalam bentuk word dan excel tidak mudah terbaca oleh pihak yang berkepentingan, bagaimana menerapkan algoritma bowfish untuk file word dan kriptografi AES pada file excel. Tujuan dari penelitian ini adalah membuat sistem yang dapat memberikan keamanan data terhadap proses pengiriman file-file word dan excel pada LPPPTK KPTK dari pihak yang tidak berkepentingan. Adapun metode yang digunakan adalah metode algoritma Blowfish dan kriptografi AES, algoritma Blowfish adalah Blowfish merupakan metoda enkripsi yang mirip dengan DES (DES-like cipher) dan kriptografi AES adalah algoritma simetri yaitu mengunakan kunci yang sama untuk proses enkripsi dan deskripsi. Hasil dari penilitian ini adalah dengan adanya sistem informasi berbasis android dan menerapkan algoritma blowfish pada pengiriman file word maka data-data file data word telah di enkripsi begitu pula dengan menerapkan kritografi AES untuk pengiriman data excel telah di enkripsi sehingga terhinndar dari gangguan pihak-pihak yang tidak berkrpentingan dan proses pengiriman file pada LPPPTK KPTK Gowa keamanan datanya lebih terjamin.


Sign in / Sign up

Export Citation Format

Share Document